000 | 03080nam a22004335i 4500 | ||
---|---|---|---|
001 | 978-1-4302-6572-6 | ||
003 | DE-He213 | ||
005 | 20190313085123.0 | ||
007 | cr nn 008mamaa | ||
008 | 140828s2014 xxu| s |||| 0|eng d | ||
020 |
_a9781430265726 _9978-1-4302-6572-6 |
||
024 | 7 |
_a10.1007/978-1-4302-6572-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aRuan, Xiaoyu. _eauthor. |
|
245 | 1 | 0 |
_aPlatform Embedded Security Technology Revealed _h[electronic resource] / _cby Xiaoyu Ruan. |
264 | 1 |
_aBerkeley, CA : _bApress : _bImprint: Apress, _c2014. |
|
300 |
_aXX, 272 p. 74 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
506 | 0 | _aOpen Access | |
520 | _aPlatform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aSoftware Engineering/Programming and Operating Systems. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781430265719 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4302-6572-6 |
912 | _aZDB-2-CWD | ||
999 |
_c48267 _d48267 |